U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

EXECUTIVE GUIDE TO COMPUTER SECURITY

NCJ Number
14581
Author(s)
D K BRANSTAD; S K REED
Date Published
Unknown
Length
16 pages
Annotation
A PAMPHLET, IN QUESTION AND ANSWER FORM, DEALING WITH SUCH TOPICS AS THE NEED FOR SECURITY, SYSTEM VULNERABILITIES, TECHNICAL SOLUTIONS, AND MANAGEMENT SOLUTIONS.
Abstract
THE MATERIAL WAS DRAWN FROM A REPORT OF A WORKSHOP OF TECHNICAL EXPERTS IN THE FIELD OF COMPUTER SECURITY. COMPUTER SECURITY IS DEFINED, AND THREATS TO THE COMPUTER SYSTEM THROUGH THEFT OR DESTRUCTION ARE DISCUSSED. CAPABILITIES AND LIMITATIONS OF SECURITY SYSTEMS, AND SYSTEM VULNERABILITIES SUCH AS REMOTE TERMINALS, SHARED SYSTEMS, OR BUGGING OF LINKING COMMUNICATION LINES ARE INDICATED. TECHNICAL SOLUTIONS, INCLUDING COMPUTER-BASED PROTECTION TECHNIQUES, IDENTIFICATION TECHNIQUES, AND SECURITY AUDIT TECHNIQUES ARE PRESENTED. MANAGEMENT SOLUTIONS ARE ALSO DISCUSSED. AMONG THESE SOLUTIONS ARE PHYSICAL SECURITY PLANNING, PERSONNEL SELECTION AND EDUCATION, SYSTEM SELECTION AND PROCUREMENT OF COMPUTER SYSTEM SECURITY OPTIONS, AND SECURITY CERTIFICATION. PRIORITIES FOR IMPROVING COMPUTER SECURITY ARE ALSO LISTED.